Multiple integer overflows in the (1) curlescape, (2) curleasyescape, (3) curlunescape, and (4) curleasyunescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "curl-udeb": "7.35.0-1ubuntu2.10", "libcurl3": "7.35.0-1ubuntu2.10", "libcurl4-gnutls-dev": "7.35.0-1ubuntu2.10", "libcurl3-dbgsym": "7.35.0-1ubuntu2.10", "libcurl3-nss": "7.35.0-1ubuntu2.10", "libcurl4-doc": "7.35.0-1ubuntu2.10", "libcurl3-udeb-dbgsym": "7.35.0-1ubuntu2.10", "libcurl3-gnutls-dbgsym": "7.35.0-1ubuntu2.10", "libcurl4-openssl-dev": "7.35.0-1ubuntu2.10", "libcurl4-openssl-dev-dbgsym": "7.35.0-1ubuntu2.10", "curl-dbgsym": "7.35.0-1ubuntu2.10", "curl": "7.35.0-1ubuntu2.10", "libcurl3-udeb": "7.35.0-1ubuntu2.10", "curl-udeb-dbgsym": "7.35.0-1ubuntu2.10", "libcurl4-nss-dev-dbgsym": "7.35.0-1ubuntu2.10", "libcurl3-gnutls": "7.35.0-1ubuntu2.10", "libcurl4-gnutls-dev-dbgsym": "7.35.0-1ubuntu2.10", "libcurl3-nss-dbgsym": "7.35.0-1ubuntu2.10", "libcurl3-dbg": "7.35.0-1ubuntu2.10", "libcurl4-nss-dev": "7.35.0-1ubuntu2.10" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "libcurl3": "7.47.0-1ubuntu2.2", "libcurl4-gnutls-dev": "7.47.0-1ubuntu2.2", "libcurl3-dbgsym": "7.47.0-1ubuntu2.2", "libcurl3-nss": "7.47.0-1ubuntu2.2", "libcurl4-doc": "7.47.0-1ubuntu2.2", "libcurl3-gnutls-dbgsym": "7.47.0-1ubuntu2.2", "libcurl4-openssl-dev": "7.47.0-1ubuntu2.2", "libcurl4-openssl-dev-dbgsym": "7.47.0-1ubuntu2.2", "curl-dbgsym": "7.47.0-1ubuntu2.2", "curl": "7.47.0-1ubuntu2.2", "libcurl4-nss-dev-dbgsym": "7.47.0-1ubuntu2.2", "libcurl3-gnutls": "7.47.0-1ubuntu2.2", "libcurl4-gnutls-dev-dbgsym": "7.47.0-1ubuntu2.2", "libcurl3-nss-dbgsym": "7.47.0-1ubuntu2.2", "libcurl3-dbg": "7.47.0-1ubuntu2.2", "libcurl4-nss-dev": "7.47.0-1ubuntu2.2" } ] }